A Comparison of Intrusion-Tolerant System Architectures

被引:20
|
作者
Nguyen, Quyen L. [1 ]
Sood, Arun [1 ]
机构
[1] George Mason Univ, Dept Comp Sci, Fairfax, VA 22030 USA
基金
美国国家科学基金会;
关键词
detection-based; Internet; intrusion tolerance; Open Archival Information System; open systems; recovery-based; security and privacy; Web;
D O I
10.1109/MSP.2010.145
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the advancing sophistication of security attacks, protecting open systems is increasingly challenging. Intrusion tolerance should be part of overall in-depth security. This article compares three types of intrusion-tolerant system architectures. © 2006 IEEE.
引用
收藏
页码:24 / 31
页数:8
相关论文
共 50 条
  • [31] Poligraph: Intrusion-Tolerant and Distributed Fake News Detection System
    Shan, Guohou
    Zhao, Boxin
    Clavin, James R.
    Zhang, Haibin
    Duan, Sisi
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 28 - 41
  • [32] A lightweight intrusion-tolerant overlay network
    Obelheiro, Rafael R.
    Fraga, Joni da Silva
    NINTH IEEE INTERNATIONAL SYMPOSIUM ON OBJECT AND COMPONENT-ORIENTED REAL-TIME DISTRIBUTED COMPUTING, PROCEEDINGS, 2006, : 496 - 503
  • [33] Evaluating Intrusion-Tolerant Certification Authority Systems
    Lin, Jingqiang
    Jing, Jiwu
    Liu, Peng
    QUALITY AND RELIABILITY ENGINEERING INTERNATIONAL, 2012, 28 (08) : 825 - 841
  • [34] Deploying Intrusion-Tolerant SCADA for the Power Grid
    Babay, Amy
    Schultz, John
    Tantillo, Thomas
    Beckley, Samuel
    Jordan, Eamon
    Ruddell, Kevin
    Jordan, Kevin
    Amir, Yair
    2019 49TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN 2019), 2019, : 328 - 335
  • [35] Intrusion-tolerant server architecture for survivable services
    Min, YJ
    JOURNAL OF SUPERCOMPUTING, 2005, 33 (1-2): : 93 - 102
  • [36] A novel intrusion-tolerant approach for Internet access
    Wen, Yan
    Zhao, Jinjing
    Wang, Huaimin
    2008 INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING AND 2008 INTERNATIONAL PACIFIC WORKSHOP ON WEB MINING AND WEB-BASED APPLICATION, 2008, : 485 - +
  • [37] Intrusion-tolerant server architecture for survivable services
    Min B.J.
    Journal of Supercomputing, 2005, 33 (01): : 93 - 102
  • [38] On the effects of finite memory on intrusion-tolerant systems
    Veronese, Giuliana Santos
    Correia, Miguel
    Lung, Lau Cheuk
    Verissimo, Paulo
    13TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS, 2007, : 401 - 404
  • [39] DiveInto: Supporting Diversity in Intrusion-Tolerant Systems
    Antunes, Joao
    Neves, Nuno
    2011 30TH IEEE INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS), 2011, : 137 - 146
  • [40] On the correctness of an intrusion-tolerant group communication protocol
    Layouni, M
    Hooman, J
    Tahar, S
    CORRECT HARDWARE DESIGN AND VERIFICATION METHODS, PROCEEDINGS, 2003, 2860 : 231 - 246